Analysis
-
max time kernel
21s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2023 02:13
Static task
static1
Behavioral task
behavioral1
Sample
PlayStation.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PlayStation.exe
Resource
win10v2004-20230220-en
General
-
Target
PlayStation.exe
-
Size
4.8MB
-
MD5
fb049d70b56c8edad8246e41546db8bd
-
SHA1
f02c296d7bdf0042ff659c51aa8148703c430eb6
-
SHA256
d0421b25e316db606840821ea866c401ea86c74351b2389d94d3e4bffd8490cd
-
SHA512
5a47f8df412703647692c6b0b3b17a58d5a94662ee974f3bc745674b1fa5940ca3e7a0be286746bc0b770b8644aa0631dcdde7711dedbc44142971958a1e5b22
-
SSDEEP
98304:cEbcGOIs0z87c8NykySN5wI+cu23ksxlSZfmxgNXxcl7QO+P/I0Fy59XM7aQH7c:cJIsG87c8NykvP3bxlSZkgNXxNP/Ijxp
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1304 cmd.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1696-59-0x000000001C430000-0x000000001C6D0000-memory.dmp agile_net C:\Users\Admin\AppData\Local\Temp\005A4F0E.dll agile_net behavioral1/memory/1696-63-0x0000000000260000-0x0000000000270000-memory.dmp agile_net -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
PlayStation.exepid process 1696 PlayStation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1308 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PlayStation.exeshutdown.exedescription pid process Token: SeDebugPrivilege 1696 PlayStation.exe Token: SeShutdownPrivilege 1496 shutdown.exe Token: SeRemoteShutdownPrivilege 1496 shutdown.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
PlayStation.execmd.execmd.execmd.exedescription pid process target process PID 1696 wrote to memory of 568 1696 PlayStation.exe cmd.exe PID 1696 wrote to memory of 568 1696 PlayStation.exe cmd.exe PID 1696 wrote to memory of 568 1696 PlayStation.exe cmd.exe PID 568 wrote to memory of 1724 568 cmd.exe cmd.exe PID 568 wrote to memory of 1724 568 cmd.exe cmd.exe PID 568 wrote to memory of 1724 568 cmd.exe cmd.exe PID 1696 wrote to memory of 1496 1696 PlayStation.exe shutdown.exe PID 1696 wrote to memory of 1496 1696 PlayStation.exe shutdown.exe PID 1696 wrote to memory of 1496 1696 PlayStation.exe shutdown.exe PID 1724 wrote to memory of 1308 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 1308 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 1308 1724 cmd.exe timeout.exe PID 1696 wrote to memory of 1304 1696 PlayStation.exe cmd.exe PID 1696 wrote to memory of 1304 1696 PlayStation.exe cmd.exe PID 1696 wrote to memory of 1304 1696 PlayStation.exe cmd.exe PID 1304 wrote to memory of 616 1304 cmd.exe PING.EXE PID 1304 wrote to memory of 616 1304 cmd.exe PING.EXE PID 1304 wrote to memory of 616 1304 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\PlayStation.exe"C:\Users\Admin\AppData\Local\Temp\PlayStation.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /c start cmd /C "color b && title Error && echo Debugger Detected && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo Debugger Detected && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 102⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\PlayStation.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\005A4F0E.dllFilesize
1.2MB
MD5c9d85c3085dc73b74366b6d8f4644cba
SHA1780c045c53ef406e5c22cd583f9bc6d83e77d2b4
SHA256097d2ea9acce50bec9d55d91ebbee60f6c5d9e705511852630dc2df440061c84
SHA5122c9e3c42bbe73acbdea527f1c4a21ce59f19fd9c6c3e9412af10ea3f1f068eb47c8634f7bdcea29fcc898bfb78ca040e89b46823ff0c4a830bda0024bb68e6b6
-
memory/1696-64-0x0000000000260000-0x0000000000270000-memory.dmpFilesize
64KB
-
memory/1696-59-0x000000001C430000-0x000000001C6D0000-memory.dmpFilesize
2.6MB
-
memory/1696-61-0x0000000000750000-0x0000000000756000-memory.dmpFilesize
24KB
-
memory/1696-57-0x000000001BFA0000-0x000000001C020000-memory.dmpFilesize
512KB
-
memory/1696-63-0x0000000000260000-0x0000000000270000-memory.dmpFilesize
64KB
-
memory/1696-54-0x0000000000270000-0x0000000000746000-memory.dmpFilesize
4.8MB
-
memory/1696-65-0x0000000000260000-0x0000000000270000-memory.dmpFilesize
64KB
-
memory/1696-66-0x000000001E100000-0x000000001E462000-memory.dmpFilesize
3.4MB
-
memory/1696-67-0x0000000000B90000-0x0000000000BAA000-memory.dmpFilesize
104KB
-
memory/1696-68-0x000000001F3E0000-0x000000001F7B6000-memory.dmpFilesize
3.8MB
-
memory/1820-70-0x00000000026E0000-0x00000000026E1000-memory.dmpFilesize
4KB
-
memory/1960-69-0x0000000002840000-0x0000000002841000-memory.dmpFilesize
4KB